The PrivacyAES type exposes the following members.


Public methodPrivacyAES
Standard constructor.


Public methodDecrypt
Decrypt ScopedPdu BER encoded byte array.
Public methodEncrypt
Encrypt ScopedPdu data BER encoded in a byte array.
Public methodEquals
Determines whether the specified Object is equal to the current Object.
(Inherited from Object.)
Public methodExtendShortKey
Some protocols support a method to extend the encryption or decryption key when supplied key is too short.
Protected methodFinalize
Allows an Object to attempt to free resources and perform other cleanup operations before the Object is reclaimed by garbage collection.
(Inherited from Object.)
Public methodGetEncryptedLength
Calculates and returns length of the buffer that is the result of the encryption method.
Public methodGetHashCode
Serves as a hash function for a particular type.
(Inherited from Object.)
Public methodGetType
Gets the Type of the current instance.
(Inherited from Object.)
Protected methodMemberwiseClone
Creates a shallow copy of the current Object.
(Inherited from Object.)
Protected methodNextSalt
Get next salt Int64 value. Used internally to encrypt data.
Public methodPasswordToKey
Convert privacy password into encryption key using packet authentication hash.
Public methodToString
Returns a String that represents the current Object.
(Inherited from Object.)


Protected field_keyBytes
AES protocol key bytes. Valid values are 16 (for AES128), 24 (AES192) or 32 (AES256).
Protected field_salt
Salt value


Public propertyCanExtendShortKey
AES implementation supports extending of a short encryption key. Always returns true.
Public propertyMaximumKeyLength
Get maximum encryption/decryption key length required by the protocol.
Public propertyMinimumKeyLength
Get minimum encryption/decryption key length required by the protocol.
Public propertyName
Privacy protocol name. Returns string "AES"
Public propertyPrivacyParametersLength
Get length of the privacy parameters byte array that is generated by the encryption method and used by the decryption method.

See Also